Source: abseil
Version: 20230802.1-4
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Control: found -1 20220623.1-1

Hi,

The following vulnerability was published for abseil.

CVE-2025-0838[0]:
| There exists a heap buffer overflow vulnerable in Abseil-cpp. The
| sized constructors, reserve(), and rehash() methods of
| absl::{flat,node}hash{set,map} did not impose an upper bound on
| their size argument. As a result, it was possible for a caller to
| pass a very large size that would cause an integer overflow when
| computing the size of the container's backing store, and a
| subsequent out-of-bounds memory write. Subsequent accesses to the
| container might also access out-of-bounds memory. We recommend
| upgrading past commit 5a0e2cb5e3958dd90bb8569a2766622cb74d90c1


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-0838
    https://www.cve.org/CVERecord?id=CVE-2025-0838
[1] 
https://github.com/abseil/abseil-cpp/commit/5a0e2cb5e3958dd90bb8569a2766622cb74d90c1

Regards,
Salvatore

Reply via email to